Skip to main content

Home/ Digiteen/ Group items tagged messages

Rss Feed Group items tagged

Miller S.

Behaveyourself.com: Online Manners Matter | Edutopia - 1 views

  • So what, exactly, is good netiquette? "A lot of it has to do with tone -- how you ask for things," says Shawn Morris, administrative coordinator of Wichita eSchool, a virtual public school in Wichita, Kansas, that reviews netiquette dos and don'ts with students. No "SHOUTING" and avoiding IM-speak in formal messages are among the most common guidelines. (See "Don't Even Think About It: The Basics of Netiquette," below, and "Beyond Emily: Post-ing Etiquette.") Good online communication is especially important in virtual schools, where most interaction happens digitally. But with the Internet an ever-larger part of most students' lives, brick-and-mortar schools from Longmont, Colorado, to Modesto, California, are starting to teach netiquette, too.
  • call it Online Manners and Ethics 101.
  •  
    edutopia article about netiquette
  •  
    So what, exactly, is good netiquette? "A lot of it has to do with tone -- how you ask for things," says Shawn Morris, administrative coordinator of Wichita eSchool, a virtual public school in Wichita, Kansas, that reviews netiquette dos and don'ts with students. No "SHOUTING" and avoiding IM-speak in formal messages are among the most common guidelines. (See "Don't Even Think About It: The Basics of Netiquette," below, and "Beyond Emily: Post-ing Etiquette.") Good online communication is especially important in virtual schools, where most interaction happens digitally. But with the Internet an ever-larger part of most students' lives, brick-and-mortar schools from Longmont, Colorado, to Modesto, California, are starting to teach netiquette, too.
Ashley M

digiteen2008 - Digital Literacy - 0 views

  • Some teachers are trying to use digital literacy in there classrooms daily to try to help students become involved. Our teachers use overhead projectors, smartboards, and televisions.Many of us use computers in our classes. If we do not learn how to use computers we could soon be separated by the digital divide. The digital divide could end up leaving some of us jobless. We need to be able to use all of the technology we have access to so we can succeed. In a article called "Digitally addicted kids threaten to return to civilization to the dark ages" a girl named Megan Meier committed suicide due to Cyber bullying. A kid named Josh Evans did this, who later turned out to be Megan's ex boyfriends mom Lori Drew. There are so many examples of digital literacy. We use them in everyday life. We use computers all the time, don’t we? I know if you work in an office then you do. Also, Teens are in love with text messages, although text messaging can be very harmful. While texting you could be bullying someone. Like I said before about computers, not only do business people use them, but parents and teens, and maybe some younger children. Teens get in chat rooms all the time. Some probably don’t even know what they are getting into. In chat rooms people can be pushed to do something or even be bullied. Chat rooms and the use of text messaging can be harmful.
    • Ashley M
       
      This information is very informative.
  • The digital divide could end up leaving some of us jobless
    • Ashley M
       
      This sentence is very true. The information in the following paragraph explains how the digital divide could leave some of us jobless.
  • Tasks are being accomplished with the use of technology more than ever.
    • Ashley M
       
      I find this fact very true.
  • ...3 more annotations...
  • Relying too much on technology is a problem because it isn't always reliable.
    • Ashley M
       
      I also find this very true..The following statement explains how relying on technology too much could be a negative thing.
  • Digital literacy is trying to teach basic computer concepts and skills. Literacy isn’t being able to read and write, like used to be. It deals with being able to tell the difference between a real and fake website.
    • Ashley M
       
      This is a great definition of what Digital Literact is.
  • Teachers are beginning to use overhead projectors, clickers, and television more
    • Ashley M
       
      This statement explains how our world is relying more on technology each day.
  •  
    This page shows that things bookmarked digital_literacy through the group automatically go to the students in the project. The teachers (who all use diigo) just tag throughout the year to have things ready to go into the wiki when it is time for the project.
  •  
    This is last years information on digital literacy.
Steve Madsen

New Jersey Principal Asks Parents To Ban Facebook, Social Networking, Text Messaging - ... - 0 views

  •  
    Anthony Orsini, the principal at Benjamin Franklin Middle School in Ridgewood, sent out an e-mail Wednesday morning asking parents to help him get all of his students off social networks and keep careful track of their text messages.
  •  
    An interesting article about the use or not the use of technologies within schools. do you have an opinion?
William B

Internet and Computer Addiction: Signs, Symptoms, and Treatment - 1 views

  • Computer Addiction – obsessive playing of off-line computer games, such as Solitaire or Minesweeper, or obsessive computer programming.
  • The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person’s Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it’s time to strike a new balance.
  •  
    The Internet can be a good thing and a bad thing. some people need the Internet for work. If you are addicted to the Internet you cut you relationships and outside activities out of your life. Addiction to the Internet can damage your health. "The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person's Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it's time to strike a new balance."
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
 Lisa Durff

On growing "knowledge citizens" « NeverEndingSearch - 0 views

  •  
    Pierre Levy, an expert on collective intelligence, is interviewed in this video by Howard Rheingold. He explains that he views collective intelligence is a combination of filtering the knowledge stream and signaling to others via hyperlinks the value of your messages in the knowledge stream. Notice his words->"you are organizing the memory for others". This is exactly what you are doing in this project with tags and later with your wiki research followed by your videos - you are librarians !
  •  
    Pierre Levy, an expert on collective intelligence, is interviewed in this video by Howard Rheingold. He explains that he views collective intelligence is a combination of filtering the knowledge stream and signaling to others via hyperlinks the value of your messages in the knowledge stream. Notice his words->"you are organizing the memory for others". This is exactly what you are doing in this project with tags and later with your wiki research followed by your videos - you are librarians !
Julia B

Using Social Networking Sites To Generate Awareness | Social Media Online - 0 views

  • “A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. Most social network services are web based and provide a variety of ways for users to interact, such as e-mail and instant messaging services. Social networking has encouraged new ways to communicate and share information. Social networking websites are being used regularly by millions of people, and it now seems that social networking will be an enduring part of everyday life.”
  •  
    Social Networking Sites
Valerie B.

Internet Safety PSA -- Instant Messaging - YouTube - 2 views

  •  
    Instant messaging safety
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Jenna A

The Importance of Fluency - All Info About Reading - Promoting Literacy for All - 0 views

  •  
    " Reading fluency is a measure of how quickly, smoothly, and easily text is read. Fluency means that words are read quickly and accurately, with little or no stumbling. It allows complete comprehension because less effort is needed for decoding. More thought power is available for understanding the author's message. Fluent readers read with expression and follow the punctuation cues. They read in sensible phrases, with pauses in natural places. Fluent readers are able to read aloud without attracting attention to the reading process, and listeners get the sense that the reader has a good grasp of the author's intent. Many reading students fall short of fluency. They read well enough to get by, but not well enough to enjoy what they are doing. Struggling readers often have a very large gap between the level at which they read fluently and their grade placement level or the demands of their day-to-day life. Most find this very frustrating, and they will try to avoid reading tasks. "
  •  
    This tells you what reading fluency is and how kids fall short of it.
Vicki Davis

Do I Know You? Fake Friends Adding Fresh Danger To Facebook - 0 views

  •  
    The issue of fake friends and sham accounts is becoming a problem on FAcebook. This is an extensive article about the topic that can be referenced in our project. "Though the access varies depending on each individual's privacy settings, once a spammer has become "friends" with other users, he can then tag them in photos, post messages to their walls, chat with them, send status updates to their news feeds and connect with their friends. In this fashion, the fake friends insinuate themselves into the social networks of all of the people they reach, with each new friend reinforcing the appearance that the relationships are real and making it easier to add even more friends."
Vicki Davis

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 6 views

  •  
    It is legal for a prospective employer during a job interview to ask you to log into your facebook page and click through your friends only posts, photos, and messages. This is a very important topic for digital citizens to understand.
  • ...7 more comments...
  •  
    This is an important article. I'm going to discuss it with my Digiteen class this morning and have them comment here.
  •  
    I don't think that is fair. The employer has no right to be a part of their personal life. Although, they need to know about what they say on the internet. I would not want someone i don't know looking at my profile page.
  •  
    This is a good and a bad thing. It is a good thing because if someone is bad than you know not to hire them. it is a bad thing because people should not be judged on what their friends post. Just because their friends might post bad things does not mean that they are bad.
  •  
    Well, for me the act of "shoulder surfing" is good as well bad. It is good because as an employer if I don't know the maybe future employee this would be good to base my opinion on whether or not to hire them. This also can be bad, as the future employee may have private conversation with his or her wife that they do not want anyone to see (this is just to give an example).
  •  
    I guess i could understand why they have this. I personally like this idea in most ways, but not all. For example, its good for finding if the person your employing is a criminal, or someone bad. But its kind of bad because what if someone is not accepted because they were talking with a 'special someone' and the employers saw. That doesn't really seem fair to me, because that is your personal PERSONAL info, and no one else needs to see it besides you and who you are talking to. Unless of course its about something bad like planning something illegal. The main downside i see in this is maybe that person created a fake Facebook that looks all great and seems like they are a good person. Then a not-so-good person might have gotten a job that they wouldn't have gotten otherwise. I can't really decide if this is good or bad, but for now, I'm going to say it's bad.
  •  
    Well i think it is 50/50, because you have to be careful of what you put out there. And i don't think they should go on your friends facebook account to look at there posts and not yours! I also don't think they should judge you by your friends!
  •  
    I dont know exactly if this is fair or not. I can see where employers are coming from by wanting to see their possible employees facebook account, but i also think that a lot of the stuff that we may post may be completely personal while being completely innocent. everyone needs privacy and if they decide to do that through facebook then they have the right.
  •  
    I think its a good video to watch because it definitely made me think. The video also scared me even thought i don't have a Facebook. I now know how to stay safe if i get one.
  •  
    I think that the post is mean. I don't really like the post because it makes the person look bad.
Miller S.

Usenet: Not dead yet - 0 views

  •  
    As with anything that has been around as long as Usenet, and been so important to so many people, there's a great deal of folklore that's grown up around it, reflected in terms like "Big 8" and "The Great Renaming," "Netiquette" and "Never-ending September." Usenet's technological underpinnings predate its association with the Internet, resting on dial-up-based store-and-forward e-mail BBS systems and UUCP protocols and programs. Although its name makes it sound monolithic, Usenet is perhaps best described as a huge, loose collection of informal information-exchange communities that have little in common beyond their naming convention and their reliance on the Network News Transfer Protocol used to manage Usenet messages. The basic unit is the newsgroup, a threaded discussion devoted to a topic. Newsgroups are organized by topic into hierarchies. Google Groups, which provides access to Usenet, lists more than 1,000 top-level hierarchies. Many of these are named for a country or city, company or product. The Microsoft hierarchy, for example, includes 3,337 newsgroups, such as microsoft.public.mac.office.entourage, microsoft.public.scripting.vbscript and microsoft.public.outlook.calendaring.
Becca B

Top 26 Most Important Rules of Email Etiquette - About Email - 0 views

  •  
    "2. Do Not Default to "Reply All" - Email Etiquette Tip "Reply" is good. "Reply to All" is better. Right? 3. Keep Emails Short - Email Etiquette Tip Do not intimidate recipients with too much text. 4. Properly Format Your Email Replies, and Be Lazy - Email Etiquette Tip Do you think quoting original text in your email replies perfectly is a lot of work? Don't let the '>' intimidate you! Here's a very comfortable, relaxed, quick and still clean and compatible way to reply properly. 5. Write Perfect Subject Lines - Email Etiquette Tip Do you make these mistakes in your email subjects? (The key to getting your messages read is not to be clever.) 6. Clean Up Emails Before Forwarding Them - Email Etiquette Tip Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation. 7. When in Doubt, Send Plain Text Email, Not HTML - Email Etiquette Tip Not everybody can receive your fancily formatted emails. Some may even react furious. To be safe rather than sorry, send plain text emails only when in doubt. 8. Don't Forward Hoaxes - Email Etiquette Tip Email hoaxes often contain stories that are intriguing, and sure to irritate. Here's how to spot and stop urban legends. Sponsored Links Business EtiquetteWorkshop materials to teach proper busines etiquete.CorporateTrainingMaterials.com Virus and Trojan RemoverDownload Free Trojan & Virus Scan Recommended and Used By The Expertswww.pctools.com 9. Use Current Antivirus Software, Keep it Up to Date, Scan for Free Make sure you're not spreading worms and viruses via email or act as a vehicle for spreading spam. All this can be caused by malicious emails. Fortunately, there's protection. 10. Say Why You Think What You Forward Will Interest the Recipient More and better communication makes better relationships. Here's a way to spot and share relevant information and foster ties by forwarding emails and links."
Taylor B

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
Becca B

Top Five Netiquette Rules in an Online Course (or Anywhere) for Success - 0 views

  •  
    "1- Be friendly, positive and self-reflective. When people cannot see you, and also do not know you, feelings can be hurt if you are not careful in how you express yourself. The old saying, think before you speak is important here. Think before you write. One word of advice is do not respond when you feel angry. Wait. Write it down somewhere and come back to it. When you do, you may find that you no longer feel the same way as you did when you wrote it, because you have had time to reflect about the situation. Last, if you still feel the need to be heard, then edit before you post, and write it in terms that are easily embraced. This is also true when you feel a critique is necessary, say it in a positive tone. Reread what you have written to be sure it is positive. 2- Use proper language and titles. Do not use slang or even profane words in an online education environment, even if they are words you consider, "not so bad," as they will sound offensive to the reader. Do not refer to your professor as "Doc" or by his or her first name, unless it is acceptable with him or her to do so. Also, do not use caps lock when writing. It will insinuate yelling. That would hurt someone's feelings and possibly give him or her the wrong impression of you. 3- Use effective communication. This takes practice and thoughtful writing. Try to speak and write clearly at all times. Again, reread before you respond. Define and restate your words when necessary. Correct a misunderstanding right away. Chances are, if one person felt a certain way about what you said, then another may have as well. Likewise, be mindful of chosen words and joking. Let's say for example, I write, "get out!" This slang term can be interpreted in several ways, either positively or negatively. 4- Professionalism. Leave the characters like smiley faces, and instant message abbreviations out. Your friends may like it, but chances are, your professor will not. Save it for personal conversations or definitely ask
Becca B

Online Etiquette - 2 views

  • Respect others and their opinions. Your colleagues come from various backgrounds as they come together. It is important to respect their feelings and opinions though they may differ from your own. Consider others’ privacy. Be wary of your discussion topics and how private or open they may be. Keep in mind that all private messaging of any form is considered copyrighted by the original author. Pick the right tone. Since we depend on written communication in ESCnet, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them. Be forgiving. If someone states something that you find offensive, mention this directly to that person and notify our system administrators. Remember that the person contributing to the discussion might be new to this form of communication. Think before you hit the send button. Think carefully about the content of your messages and posts before contributing them. Once sent to the group or the recipient, there is no taking it back. Grammar and spelling errors reflect on you, and your audience might not be able to decode misspelled words or poorly constructed sentences. Brevity is best. Be as concise as possible when contributing anywhere in ESCnet. Your points might me missed if hidden in a flood of text. Stick to the point. Contributions to a discussion should stick to the subject deemed important by the group admin or discussion creator. Don’t waste others' time by going off on irrelevant tangents. Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Avoid frivolous email. Don’t forward jokes, "chain letters" or unimportant posts to colleagues in ESCnet without their permission. Not only does it fill up their screens, but it may offend people who do not share the same sense of humor.
Joseph Edore

Safety Pledges - 0 views

  • Safety Pledges
  • Internet Safety Pledges "House pledges" or "acceptable-use policies" can help provide clear guidelines for safer Internet use. NetSmartz recommends using the "Internet Safety Pledge" to promote safety discussions and create safer boundaries.
  • Middle and High School Internet Safety Rules Download I WILL THINK BEFORE I POST. I agree not to post information and images that could put me at risk, embarrass me, or damage my future, such as cell & home phone numbers home address sexual messages inappropriate pictures and videos I WILL RESPECT OTHER PEOPLE ONLINE. I will not post anything rude, offensive, or threatening send or forward images and information that might embarrass, hurt, or harass someone take anyone's personal information and use it to damage his or her reputation I WILL BE CAREFUL WHEN MEETING ONLINE FRIENDS IN PERSON. I agree to ask my parent or guardian's permission before going have a parent or guardian accompany me meet in a public place I WILL PROTECT MYSELF ONLINE. If someone makes me feel uncomfortable or if someone is rude or offensive, I will not respond save the evidence tell my parent, guardian, or another trusted adult report to the website, cell phone company, CyberTipline.com, or the police
‹ Previous 21 - 40 of 84 Next › Last »
Showing 20 items per page